Spelling suggestions: "subject:"4digital communications"" "subject:"deigital communications""
341 |
On combination and interference free window spreading sequencesCresp, Gregory January 2008 (has links)
Spread spectrum techniques have a number of different applications, including range finding, synchronisation, anti-jamming systems and multiple access communication systems. In each of these applications the properties of the resulting systems depend heavily on the family of spreading sequences employed. As such, the design of spreading sequences is an important area of research. Two areas of spreading sequence design are of particular interest in this work, combination techniques and Interference Free Window (IFW) sequences. Combination techniques allow a new sequence family to be constructed by combining two or more existing families. Such an approach allows some of the desirable properties of the components to be maintained, whilst mitigating the components' disadvantages. In addition, it can facilitate the construction of large families at a greatly reduced computational cost. Combination families are considered through the construction of two new classes of sequences, modified Unified Complex Hadamard Transform (UCHT) sequences, and combination Oppermann sequences, respectively based on UCHT sequences and periodic Oppermann sequences. Numerical optimisation techniques are employed to demonstrate the favourable performance of sequences from these classes compared to conventional families. Second, IFW sequences are considered. In systems where approximate, but not perfect, synchronisation between different users can be maintained, IFW sequences can be employed to greatly reduce both interference between users and interference resulting from multipath spread of each user's signal. Large Area Synchronous (LAS) sequences are a class of sequences which both result from combination techniques and exhibit an IFW. LAS sequences are produced by combining Large Area (LA) sequences and LS sequences. They have been demonstrated to be applicable to multiple access communication systems, particularly through their use in LAS2000, which was proposed for third generation mobile telephony. Work to date has been restricted to only a very small range of examples of these families. In order to examine a wider range of LAS sequences, the construction and resulting properties of LA and LS families are considered. The conditions an LA family must satisfy are codified here, and algorithms which can be used to construct LA families with given parameters are presented. The construction of LS sequences is considered, and relationship between each of the parameters used in this construction and the properties of the final family is examined. Using this expanded understanding of both these sequence families, a far wider range of LAS families, potentially applicable to a wider range of applications, can be considered. Initially, the merits of proposed sequences are considered primarily through their correlation properties. Both maximum and mean squared correlation values are considered, depending on the context. In order to demonstrate their practical applicability, combination Oppermann, modified UCHT and LAS sequences are employed in a simulated communications system, and the resulting bit error rates are examined.
|
342 |
Design and evaluation of on-line arithmetic modules and networks for signal processing applications on FPGAsGalli, Reto 07 June 2001 (has links)
Several papers propose the use of on-line arithmetic for signal processing applications
implemented on FPGAs. Although those papers provide reasonable arguments for
the use of on-line arithmetic, they give only inadequate or incomplete comparisons of
the proposed on-line designs to other state of the art solutions on FPGAs.
In this thesis, the design, implementation and evaluation of on-line modules and
networks for DSP applications, using FPGAS as the target technology, are shown. The
presented designs of the modules are highly optimized for the target hardware, which allows
a significant increase in efficiency compared to standard on-line designs. The design
process for the networks of on-line modules is described in detail, and a methodology to
analyze the dataflow and timing is presented.
A comparison of on-line signal processing solutions with other approaches. that are
available as IP building blocks or components, is given. It is shown that on-line designs
are better in terms of latency but that they can not compete in terms of throughput and
area for basic applications like FIR filters. However, it is also shown that on-line designs
are able to overtake other approaches as the applications become more sophisticated.
e.g. when data dependencies exist, or when non constant multiplicands restrict the use
of other approaches, such as serial distributed arithmetic. For these applications, online
arithmetic shows, compared to other designs, a lower latency and a significant area
reduction, while maintaining a high throughput.
Several properties of algorithms for which on-line arithmetic is advantageous are
identified in this thesis. With this information, it is possible to determine if an on-line
solution for an application should be considered.
The conclusions are based on experimental data collected using CAD tools for
the Xilinx XC4000 family of chips. All the designs are synthesized for the same type
of devices for comparison, avoiding rough estimates of the system performance. This
generates a more reliable comparison allowing designers to decide between on-line or
conventional approaches for their DSP designs. / Graduation date: 2002
|
343 |
Code-aided synchronization for digital burst communicationsHerzet, Cédric 21 April 2006 (has links)
This thesis deals with the synchronization of digital communication systems. Synchronization (from the Greek syn (together) and chronos (time)) denotes the task of making two systems running at the same time. In communication systems, the synchronization of the transmitter and the receiver requires to accurately estimate a number of parameters such as the carrier frequency and phase offsets, the timing epoch...
In the early days of digital communications, synchronizers used to operate in either data-aided (DA) or non-data-aided (NDA) modes. However, with the recent advent of powerful coding techniques, these conventional synchronization modes have been shown to be unable to properly synchronize state-of-the-art receivers.
In this context, we investigate in this thesis a new family of synchronizers referred to as code-aided (CA) synchronizers. The idea behind CA synchronization is to take benefit from the structure of the code used to protect the data to improve the estimation quality achieved by the synchronizers. In a first part of the thesis, we address the issue of turbo synchronization, i.e., the iterative synchronization of continuous parameters. In particular, we derive several mathematical frameworks enabling a systematic derivation of turbo synchronizers and a deeper understanding of their behavior. In a second part, we focus on the so-called CA hypothesis testing problem. More particularly, we derive optimal solutions to deal with this problem and propose efficient implementations of the proposed algorithms. Finally, in a last part of this thesis, we derive theoretical lower bounds on the performance of turbo synchronizers.
|
344 |
Cyber Profiling for Insider Threat DetectionUdoeyop, Akaninyene Walter 01 August 2010 (has links)
Cyber attacks against companies and organizations can result in high impact losses that include damaged credibility, exposed vulnerability, and financial losses. Until the 21st century, insiders were often overlooked as suspects for these attacks. The 2010 CERT Cyber Security Watch Survey attributes 26 percent of cyber crimes to insiders. Numerous real insider attack scenarios suggest that during, or directly before the attack, the insider begins to behave abnormally. We introduce a method to detect abnormal behavior by profiling users. We utilize the k-means and kernel density estimation algorithms to learn a user’s normal behavior and establish normal user profiles based on behavioral data. We then compare user behavior against the normal profiles to identify abnormal patterns of behavior.
|
345 |
Iterative Timing Recovery for Magnetic Recording Channels with Low Signal-to-Noise RatioNayak, Aravind Ratnakar 07 July 2004 (has links)
Digital communication systems invariably employ an underlying analog communication channel. At the transmitter, data is modulated to obtain an analog waveform which is input to the channel. At the receiver, the output of the channel needs to be mapped back into the discrete domain. To this effect, the continuous-time received waveform is sampled at instants chosen by the timing recovery block. Therefore, timing recovery is an essential component of digital communication systems.
A widely used timing recovery method is based on a phase-locked loop (PLL), which updates its timing estimates based on a decision-directed device. Timing recovery performance is a strong function of the reliability of decisions, and hence, of the channel signal-to-noise ratio (SNR). Iteratively decodable error-control codes (ECCs) like turbo codes and LDPC codes allow operation at SNRs lower than ever before, thus exacerbating timing recovery.
We propose iterative timing recovery, where the timing recovery block, the equalizer and the ECC decoder exchange information, giving the timing recovery block access to decisions that are much more reliable than the instantaneous ones. This provides significant SNR gains at a marginal complexity penalty over a conventional turbo equalizer where the equalizer and the ECC decoder exchange information. We also derive the Cramer-Rao bound, which is a lower bound on the estimation error variance of any timing estimator, and propose timing recovery methods that outperform the conventional PLL and achieve the Cramer-Rao bound in some cases.
At low SNR, timing recovery suffers from cycle slips, where the receiver drops or adds one or more symbols, and consequently, almost always the ECC decoder fails to decode. Iterative timing recovery has the ability to corrects cycle slips. To reduce the number of iterations, we propose cycle slip detection and correction methods. With iterative timing recovery, the PLL with cycle slip detection and correction recovers most of the SNR loss of the conventional receiver that separates timing recovery and turbo equalization.
|
346 |
An fpga based architecture for native protocol testing of multi-gbps source-synchronous devicesGray, Carl Edward 03 July 2012 (has links)
This thesis presents methods for developing FPGA-based test solutions that solve the challenges of evaluating source-synchronous and protocol-laden systems and devices at multi-gigabit per second signaling rates. These interfaces are becoming more prevalent in emerging designs and are difficult to test using traditional automated test equipment (ATE) and test instrumentation which were designed for testing designs utilizing synchronous and deterministic signaling. The main motivation of this research was to develop solutions that address these challenges. The methods shown in this thesis are used to design a test architecture consisting of custom hardware components, reprogrammable digital logic for hardware integration, and a software interface for external data transport and configuration. The hardware components consist of a multi-GHz field programmable gate array (FPGA) based interface board providing processing, control, and data capabilities to the system and enhanced by one or more application modules which can be tailored for specific test functionality compatible with source-synchronous and protocol interfaces. Software controls from a host computer provide high and low level access to the internal tester data and configuration memory space.
The architecture described in this thesis is demonstrated through a specific test solution for a high-speed optical packet switched network called the Data Vortex. Reprogrammable firmware and software controls allow for a high degree of adaptability and application options. The modularized implementation of the hardware elements introduces additional adaptability and future upgradability, capable of incorporating new materials and design techniques for the test platform and application modules.
|
347 |
Cyber Profiling for Insider Threat DetectionUdoeyop, Akaninyene Walter 01 August 2010 (has links)
Cyber attacks against companies and organizations can result in high impact losses that include damaged credibility, exposed vulnerability, and financial losses. Until the 21st century, insiders were often overlooked as suspects for these attacks. The 2010 CERT Cyber Security Watch Survey attributes 26 percent of cyber crimes to insiders. Numerous real insider attack scenarios suggest that during, or directly before the attack, the insider begins to behave abnormally. We introduce a method to detect abnormal behavior by profiling users. We utilize the k-means and kernel density estimation algorithms to learn a user’s normal behavior and establish normal user profiles based on behavioral data. We then compare user behavior against the normal profiles to identify abnormal patterns of behavior.
|
348 |
Channel equalization to achieve high bit rates in discrete multitone systemsDing, Ming 28 August 2008 (has links)
Not available / text
|
349 |
Automatic Detection of Abnormal Behavior in Computing SystemsRoberts, James Frank 01 January 2013 (has links)
I present RAACD, a software suite that detects misbehaving computers in large computing systems and presents information about those machines to the system administrator. I build this system using preexisting anomaly detection techniques. I evaluate my methods using simple synthesized data, real data containing coerced abnormal behavior, and real data containing naturally occurring abnormal behavior. I find that the system adequately detects abnormal behavior and significantly reduces the amount of uninteresting computer health data presented to a system administrator.
|
350 |
Optimal allocation of power to AMCS for maximum throughput in WCDMA /Lu, Hong, January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2002. / Includes bibliographical references (p. 124-127). Also available in electronic format on the Internet.
|
Page generated in 0.0968 seconds